MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks

Size: px
Start display at page:

Download "MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks"

Transcription

1 2012 IEEE 15th International Conference on Computational Science and Engineering MDS-Mac: A Scheduled MAC for Localization, Time-Synchronisation and Communication in Underwater Acoustic Networks Wouter van Kleunen, Nirvana Meratnia, Paul J.M. Havinga Pervasive Systems, University of Twente 7522 NB Enschede, The Netherlands (w.a.p.vankleunen, n.meratnia, p.j.m.havinga)@utwente.nl Abstract In this paper we describe a design for an underwater MAC protocol which combines localization, time-synchronisation and communication. This protocol is designed for small-scale clustered networks in which all nodes are able to communicate with each other. We consider an integrated design of localization, time-synchronisation and communication important because scheduled communication, localization and time-synchronisation require estimation of propagation delays between nodes to operate accurately and efficiently. For localization we use multidimensional scaling because it does not require the use of reference nodes. Our MAC design consists of two phases, i.e. an unscheduled coordination phase and a communication phase. During the first phase, propagation delays are estimated, relative positions are calculated using multidimensional scaling, and timesynchronisation is performed. During the communication phase, sensor-data is transmitted using scheduled communication. Using simulation we evaluate the feasibility of such a design. By measuring the time required for the coordination phase at different modulation rates, we derive the required modulation rate for acceptable coordination phase times. I. INTRODUCTION Underwater acoustic sensor networks can be used for monitoring the underwater world which have traditionaly been either invisible or was monitored with significant delays and low granularity. Our focus is on small clusters of static underwater nodes scattered in a small area. Examples of applications these clusters can be used for are monitoring vibrations around a site for an underwater oil-drilling site or monitoring the entry of a harbour for security reasons. Our aim is to provide communication between nodes, position estimation of nodes and time-synchronisation simultaniously through designing an integrated MAC. Existing work on time-synchronisation [1], localization [2] and communication [3] [4] consider these three aspects individualy and does not consider their impact on each other. For example papers proposing scheduled communication do not consider the localization and time-synchronisation aspects of a system, even though position estimation and time-synchronisation are required for the scheduling to work properly. Papers proposing time-synchronisation such as [1], require an estimate of the propagation delay between nodes, Fig m 500m 500m Sensor node Cluster head Communication Example of a 3d deployment of an underwater cluster however do not consider their impact on communication. Related work tends to limit its focus rather than looking at complete MAC protocol designs. In this paper we propose a MAC protocol for combined time-synchronisation, localization and communication scheduling approach for small underwater clusters. Localization requires propagation-delays to estimate distances between nodes, communication scheduling requires the delays to calculate a collision-free schedule, and time-synchronisation requires the propagation delay to provide accurate results. Therefore it makes sense to combine these algorithms in a single MAC protocol and reuse propagation delay measurements to determine node position and to do time-synchronisation and communication scheduling. The MAC protocol that we propose provides means to measure the propagation delays and use this information to schedule communication, determine the position of nodes, and provide time-synchronisation. Regarding localization, we provide relative position estimation. Our aim is to provide the localization service without requiring any setup phase for reference nodes. We see this as a significant benefit in terms of practical deployment of underwater sensor networks. Determining the positions of reference nodes under water can be difficult and requires the use of external positioning systems such as a Ultra Short Baseline (USBL) system attached to a boat or use of surface beacons equiped with GPS. When only relative positions are required, /12 $ IEEE DOI /ICCSE

2 (a) Exclusive access (b) Scheduled Fig. 2. Example of how scheduling can improve the throughput of underwater communication. such as for communication scheduling, time-synchronisation or distributed beamforming, not having to configure reference nodes provides significant benefits in terms of easy, fast and cheaper deployment of such a network. Our MAC protocol combines localization, timesynchronisation and communication in a way not done before. Traditionaly underwater MAC protocols have focused on a single aspect only. In this paper we will show a design for a MAC protocol which combines all three aspects for underwater networks. Also we consider the overhead required for scheduled communication. Before scheduled communication can be applied, the nodes in the network need to be synchronised and localized. Rather than assuming position and time-synchronisation to be given, we consider the overhead of an unscheduled communication phase required for determining these positions and time-synchronisation. We have evaluated this overhead in simulation and will show the required data-rates for an acceptable overhead. Previously we have looked at scheduling communication in underwater acoustic networks to reduce collisions, improve throughput, and reduce energy consumption. This resulted in a simplified scheduling approach described in [3], a distributed scheduling approach described in [5], and a combined timesynchronisation and localization system described in [10]. Figure 2 illustrates an example on how spatial-temporal scheduling can be used to mitigate the effects of the low propagation speed of the acoustic signal and on how it improves the throughput of underwater communication. Different from traditional scheduling approaches which require position information, in this paper we propose to use measured propagation delays between nodes for scheduling. This measured propagation delay is in practice enough to provide scheduled communication. These propagation delay measurements can then also be used to determine relative positions of nodes using multidimensional scaling (MDS) [6]. Using propagation delays measurements it will also be possible to provide time-synchronisation on the nodes which can be used for time-stamping measurements and also is required for scheduled communication approaches. The rest of this paper is organised as follows: In Section II we describe the related work in the areas of localization, timesynchronisation and communication scheduling in underwater acoustic networks. Section III describes the proposed design of the MAC protocol followed by Section IV in which we evaluate the performance of the MAC protocol to finish the paper with the conclusion in Section V. II. RELATED WORK Underwater localization has been traditionally done with acoustic signals. Propagation delay information and angular information can be used to estimate the position of the blind nodes. Using propagation delay information between blind nodes, relative positioning can be performed without requiring reference nodes with known position. This relative positioning can be done using multidimensional scaling. An example of such a system is shown in [2], which uses stressmajorization [7] to determine the relative positions of nodes in underwater acoustic networks. The article discusses some issues encountered when doing underwater localization and does some performance measurements on multidimensional scaling for underwater applications. For time-synchronisation in underwater acoustic networks much work has been done already. An example of a timesynchronisation protocol which can be used is TSHL [1], which shows that for time-synchronisation also an estimation of the propagation delay between the reference node and the unsynchronised node is needed. This is because propagation delays are more significant in acoustic networks than in radiobased networks and therefore clock-skew has a more significant impact on the accuracy of the synchronisation accuracy. TSHL is based on first estimating the clock-skew of a node and then calculating the clock-offset using a clockskew corrected estimation of the propagation delay between two nodes. The same (clock-skew corrected) information on the propagation delay between two nodes is required by localization and communication scheduling approaches. Communication scheduling has been researched also and has resulted in scheduling algorithms such as ST-MAC [4], Stump [8] and Simplified Scheduling approach [3]. These scheduling algorithms use position information of nodes to determine propagation delays, but in practice require only propagation delay information between nodes to function. For the design of our MAC protocol we chose to use our Simplified Scheduling algorithm [3], although other scheduling algorithms can be used as well. The simplified scheduling uses scheduling constraints to determine the delay between two transmissions. III. DESIGN By looking at the related work, it becomes evident that localization, time-synchronisation and communication scheduling all require information on propagation delays between nodes to function properly. The operation of our designed protocol as shown in Figure 3 is divided in a coordination and communication phase. Initially the network is in the coordination phase, in which nodes do range measurement between themselves and all other nodes in the network. Once all propagation delays between all pairs of nodes are known, all nodes can run a multidimensional scaling algorithm to determine their own position and position 667

3 of all other nodes. The nodes are also able to synchronise their clocks using the time-information from the other nodes. The cluster-head will determine the routing and scheduling of the network. We assume the cluster-head is preconfigured and all nodes know the network identifier of the clusterhead. The cluster-head will also determine when the network switches from the coordination phase to the communication phase. This is done by broadcasting the schedule for the communication phase. All nodes within the network will follow the schedule for the communication period and will fallback to the coordination phase once the schedule has finished. In the following sections we will look at how these two different phases are implemented, i.e. how coordination and scheduling is done and how information from the coordination phase can be used for relative localization and timesynchronisation. A. Coordination phase The coordination phase of the MAC protocol is all about determining the propagation delays between nodes and establishing time-synchronisation between nodes. The coordination phase of our MAC protocol is done using broadcast messages. Initialy the nodes are all unsynchronized and unaware of other nodes within the cluster. All nodes are assumed to have a preconfigured unique identifier and a preconfigured transmission interval. This phase is the initial coordination phase. Nodes will transmit broadcast message at a random time and will listen for broadcast messages from other nodes when not transmitting. The content of the broadcast messages is described in Figure 4. The broadcast message contains the source address of the node and contains a processing delay allowing other nodes to do round-trip time measurements to the node. The round-trip is the time required to send a message to a node and for the node to send a message back. The time required to do a round-trip is dependant on the distance between two nodes and the propagation speed of the acoustic signal. Figure 5 shows how round-trip time measurements can be done using the processing delay in the broadcast message. When node 3 sends a broadcast message, this message will be received by node 1. Node 1 will measure the time between receiving the broadcast message from node 1 and sending its own broadcast message. This information is stored in the processing delay field of the broadcast message. When node 3 receives the broadcast from node 1, it can measure the round-trip time and substract the processing delay on node 1. This information can be used to calculate the distance and the propagation delay of the acoustic signal between the two nodes. For the protocol to properly function, a minimum initial coordination phase time is required. This time is dependent on several parameters, namely: the total number of nodes within the cluster, dimensions of the cluster and the packet error rate. The protocol also requires a sending interval to be used during the coordination phase. This interval is the average sending Node 1 Node 2 Node 3 Fig. 5. Node 3 processing time Node 2 processing time BC BC Node 2 roundtrip time Node 3 roundtrip time Time BC BC Timeline for sending beacons and measuring propagation delays interval at which the nodes send out broadcast messages during the coordination phase. In the coordination phase, we use pure ALOHA and calculatethe optimal sending rate (G) can be calculated [9]. From the simulation resuls (Section IV) it becomes clear that the coordination phase can take a significant amount of time. Once the initial coordination is done, time required by the subsequent coordination phases can be shorter. If we reuse propagation delay measurements from previous coordination phases the next coordination phase will only update existing propagation delay measurements and therefore will be performed even faster. Communication of sensor data is done during the communication phase. In the following subsections we will look at localization and time-synchronisation, done during the coordination phase, and communication done during the communication phase. 1) Localization: Once all pair-wise propagation delays are measured, relative localization can be done using multidimensional-scaling. We can calculate the distance between two nodes denoted as δ i,j using the measured propagation delay denoted as t i,j and an estimat of the sound speed under water (v sound 1500m/s) as follows: δ i,j = 2 v sound We use these distance estimates in the dissimilarity matrix δ expressed as: δ 1,1 δ 1,2... δ 1,i δ = δ 2,1 δ 2,2... δ 2,i δ i,1 δ i,2... δ i,i The goal of multidimensional scaling is, using this dissimilarity matrix δ, to find the position vectors of the nodes x 1,..., x i R 3. This can be done by minimizing the following cost function: t i,j min w i,j ( x i x j δ ij ) 2 (1) x 1,...,x i i<j Where x i x j is the Euclidian distance between two vectors. This can be done using an iterative steepest descent approach as described by Kruskal [6]. However the iterative 668

4 Coordination Communication Communication Communication Communication Time 15 min 55 min 5 min Fig. 3. Timeline of a network in operation Field Size Description length 1 byte Length of packet type 1 byte Type of packet (coordinate) source 1 byte Unique identifier of source node time 8 bytes Time in μsec processing.delay[16] 2 bytes Delay between last received broadcast and sending of this broadcast measured.rtt[16] 2 bytes Measured round-trip time with neighbour node Total 74 bytes Fig. 4. Information contained in round-trip time measurement broadcast message majorization approach described by Van Leeuw [7] provides a significantly better approach in terms of guarantees on, and rate of, convergences. Therefore we chose to use the iterative majorization approach. Using weights it is possible to calculate the position of nodes even when pair-wise distance measurements are unavailable. When a distance measurement is unavailable, we use 0 for its weight. It is also possible to use the inverse distance estimate of a link. This means that when the measurement from δ i,j is unavailable, we use the measurement from δ j,i. In theory it is possible to use multidimensional scaling with weights to estimate the missing propagation delays. This allows the cluster-head to do the scheduling faster, allowing the network to spend less time in the coordination phase and more in the communication phase. 2) Time-Synchronisation: Using the TSHL [1] approach it is possible to do time-synchronisation. Using the measured arrival times of the beacon messages from other nodes it is possible to get an estimation of the clock skew. Because we measure the propagation delay during the coordination phase, it is also possible to accurately determine the clock offset. The time-synchronisation will be done during the coordination phase as well. By measuring the reception time of message of a neighbour, the clock-skew of the local node in relation with this neighbour can be estimated. By measuring the clock-skew in relation with all neighbours in the network, an average clock-skew can be calculated. Because round-trip time information is available, the propagation delay of a packet can be estimated. This information can be used to determine the clock-offset at the local nodes. This is done by looking at the transmission time of the packet (which is stored in the broadcast packet) and using the propagation delay. B. Communication During the communication phase, the actual sensor data transmission is performed. Rather than using unscheduled Field Size Description length 1 byte Length of packet type 1 byte Type of packet (Schedule) time start 4 byte Start time of schedule in seconds time end 4 byte End time of schedule in seconds time interval 4 byte Interval between schedule iterations in seconds total.links 1 byte Total number of links source[i] 4 bits Source node of link[i] dest[i] 4 bits Destination node of link[i] time[i] Total Fig. 6. Time when the packet can be send in 2 bytes ms 14 + (total.links 3) bytes Information contained in schedule message communication, the communication during the communication phase is scheduled. The cluster-head is responsible for calculating the schedule and will broadcast the schedule to be used during the coordination phase. The content of a schedule broadcast message is shown in Figure 6. Before calculating a schedule, the cluster-head will first determine the routing in the network. For example in a datacollection network, the cluster-head will schedule all nodes to send their measurements to a gateway node. Other communication patterns can also be scheduled, according to the requirements of the application at hand. In case the cluster-head can not make the routing decision, the cluster-head may schedule broadcast messages for all nodes. In this way, the node itself may make a decision on which node to address. In the schedule packet a broadcast message is denoted by setting the source and destination field of a link to the same value. For scheduling the transmissions, the Simplified Scheduling algorithm is used. The difference with the existing scheduling algorithm is that rather than using the positions of nodes to estimate the distance between two nodes we can use the measured propagation delays. The function T (src, dst) used 669

5 δ j.start δ i.start + δ i.duration δ j.start δ i.start + δ i.duration + T (δ i.src, δ j.src) δ j.start δ i.start + δ i.duration + max( T (δ i.src, δ i.dst) T (δ j.src, δ i.dst), T (δ i.src, δ j.dst) T (δ j.src, δ j.dst)) δ j.start δ i.start if δ i.src = δ j.src if (δ i.src = broadcast or δ j.src = broadcast) and Interfer(δ i.src, δ j.dst) if δ i.src! =δ j.src and Interfer(δ i.src, δ j.dst) otherwise (2) Fig. 8. Extended set of simplified scheduling constraints allowing broadcast scheduling. Scheduled time start Fig. 7. time interval Idle Time Scheduled Idle time end Example of different time denoters in communication phase by the simplified constraints from Figure 8 can be replaced by a lookup of the measured propagation delay. To estimate the propagation delay between node i and node j, the average of the measured propagation delay t i,j and t j,i is used. For scheduling the transmissions, we use the algorithm from [5]. This algorithm is shown in Figure 9. What the algorithm does is simply keeping a minimum starting times for all transmissions. From all these possible starting times, the minimum time is selected and this transmission is to be scheduled next. The starting time of this transmission is now fixed and all unscheduled transmissions are updated. This is done by taking the maximum of the already calculated starting time and the minimum starting time between the transmission and the just scheduled transmission. This is repeated until all transmissions are scheduled. In Figure III-B the time parameters of the schedule are explained. The communication schedule is repeated between time start and time end, this is done with an interval time interval. The schedule itself may be shorter than the interval period. This results in a idle period between different schedule runs. The time when a node can send its scheduled packet (time[i] in the schedule) is calculated relative to the start of an interval. In Figure 10 the content of a data message is described. The packet contains the identifier of the source and destination nodes. Again, the source and destination identifiers are the same if the message is a broadcast message. The data field contains the packet data. The data messages described in Figure 10 are only sent on the scheduled time as calculated by the cluster head. The reception of the data message is therefore as well determined. A node may choose to listen only when scheduled data messages are expected and turn off its modem when it is not expecting any data, thus conserving energy. V transmissions {Set of all transmissions} schedule [N] =0{Resulting schedule} schedule[0] = 0 {Schedule the first transmission} time =0 last =0 V V \ δ 0 {Remove transmission from set} {Scheduling loop schedules transmissions greedy} while!empty(v ) do time min infinity {Calculate minimum starting time for remaining transmissions} for δ V do schedule[δ index ] = max(schedule[δ index ],time + constraint(δ last,δ index )] {See if this transmission has the smallest starting time} if schedule[δ index ] <time min then time min schedule[δ index ] index δ index end if end for {Schedule transmission with smallest starting time first} time = time min last = index V V \ δ index end while Fig. 9. Reduced complexity algorithm for scheduling transmissions. Field Size Description length 1 byte Length of packet type 1 byte Type of packet (Data) source 4 bits Unique identifier of source node destination 4 bits Unique identifier of destination node data x bytes Packet data Total 3+x bytes Fig. 10. Information contained in data message IV. PERFORMANCE EVALUATION For the performance evaluation, we assume a network of 16 nodes randomly deployed on an area of 500mx500m. We assume nodes are able to communicate with any other node at the rate of 1000bps. In this scenario we run the MAC protocol and measure how long coordination phase takes, if we measure (1) all pairwise propagation delay or (ii) we require only one of the pairwise propagation delays (either t i,j or t j,i ). We also measure the time until the cluster-head detects all nodes in the network. The result are shown in Figure 11(a). We have compared the approach of relative localization with 670

6 an approach in which beacons are used. This approach is similar to the approach we have shown in [10]. In this scenario 5 out of 16 nodes in the cluster are preconfigured with a position and the other nodes will listen to these beacons to determine their position. Once they determine their position they will start broadcasting their position information as well. The information of the round-trip time measurements in the broadcast messages are replaced with the position in this scenario. The coordination phase finishes when the clusterhead collects the position information from all nodes within the network. From the results we can see that using low modulation rates, it takes a considerable time before all nodes in the cluster are detected and all pair-wise measurements are performed. When a modulation rate of 5000 bps or higher is used, the setup times become acceptable. The number of bytes sent during the coordination phase is shown in Figure 11(b). The number of bytes sent is largely independent of the modulation rate. Comparing the relative scheduling approach to an approach in which preconfigured beacons are used, we can see that the approach using preconfigured beacons performs much better. For the lower data rates, it seems using preconfigured beacons is the only viable option, because the coordination times for round-trip measurements are too large. For the higher data rates, using preconfigured beacons still outperforms the completely relative localization scenarios. However not having to preconfigure beacons may be benificial in certain use cases. In scenarios in which beacons can not be preconfigured or when absolute coordinates are not required at the nodes, relative positioning provides a suitable approach for higher data rates. Regarding the efficiency of the scheduled communication, we calculate two types of schedules for the communication phase: one with all nodes sending data to a single node (a data-collection network) and one in which all nodes are scheduled a broadcast message. The latter case allows the nodes themselves to do the routing decision. We see these two scenarios as typical use-case scenarios for our designed MAC protocol. The resulting schedule lengths are shown in Figure 12. We also evaluate the performance of the multidimensional scaling localization approach. This performance is dependant on the range-estimation error. We model the range estimation error as a normal distribution N (0,σ 2 ) with the value σ 2 set to the values of 1% to 10% of the range. We use Matlab to calculate the positions of the nodes and compared them to the real positions of the nodes. We run this for 100 random deployments, the values of the absolute errors can be seen in Figure IV. (a) Time required for coordination (b) Number of bytes send Fig. 11. Measurement of coordination phase at different modulation rates Fig. 12. Schedule lengths for all 16 nodes sending 128 bytes V. CONCLUSION We have shown a design for a MAC protocol, which combines scheduled communication, localization and timesynchronisation. This MAC protocol is designed for small cluster with limited number of nodes. Because scheduled communication, localization and time-synchronisation require Fig. 13. Accurary of localization. 671

7 measurement of propagation delays, we consider an integrated MAC design to be important. The operation of the MAC protocol is split into two phases: The first phase, the coordination phase, is used to measure the propagation delays between nodes. The second phase, the communication phase, is used to communicate sensor data. After the coordination phase, all propagation delays between the nodes are known and a localization algorithm can be run. We applied multidimensional scaling to determine the relative positions of all nodes in the cluster. We also showed that timesynchronisation can be established after the coordination phase and a communication schedule for the communication phase can be calculated. During the communication phase, nodes communicate using scheduled communication. Using the measured propagation delays we show how a communication scheduled for this phase can be calculated. Our work is novel because it provides a combined MAC protocol for localization, time-synchronisation and communication. Traditional MAC protocols consider these three aspects separately. We have perfomed measurements on the two phases of the protocol. We have shown that to get reasonable setup times for the coordination phase an modulation rate of at least 5000bps is required. We have compared the relative positioning approach to an approach where beacons with known positions are used. When beacons with known positions are used, the coordination phase can be done significantly quicker. For lower data rates (1000 bps) relative positioning does not seem to be a viable approach. In these scenarios beacons with known positions should be used to provide acceptable coordination phase times. For higher data rates relative positioning does provide acceptable coordination phase times. Using beacons with known positions still outperform relative positioning. However for certain applications setting up reference nodes may be too time consuming and require costly equipment for deployment. Also some applications may not require absolute position information on the nodes. For these types of applications, using relative positioning for underwater networks is a viable approach. [4] C.-C. Hsu, K.-F. Lai, C.-F. Chou, and K. C.-J. Lin, St-mac: Spatial-temporal mac scheduling for underwater sensor networks. in INFOCOM. IEEE, 2009, pp [Online]. Available: [5] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, Mac scheduling in large-scale underwater acoustic networks, in 8th International Joint Conference on e-business and Telecommunication, ICETE 2011, Sevilla, Spain. USA: IEEE Computer Society, July 2011, pp [6] J. Kruskal, Multidimensional scaling by optimizing goodness of fit to a nonmetric hypothesis, Psychometrika, vol. 29, pp. 1 27, 1964, /BF [Online]. Available: /BF [7] J. de Leeuw, Applications of convex analysis to multidimensional scaling, in Recent Developments in Statistics, J. Barra, F. Brodeau, G. Romier, and B. V. Cutsem, Eds. Amsterdam: North Holland Publishing Company, 1977, pp [8] K. Kredo II and P. Mohapatra, Distributed scheduling and routing in underwater wireless networks, Globecom 2010, [9] A. Tanenbaum, Computer Networks, 4th ed. Prentice Hall Professional Technical Reference, [10] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, Scheduled mac in beacon overlay networks for underwater localization and timesynchronization, in The Sixth ACM International Workshop on Underwater Networks (WUWNet), Seattle, USA. New York: ACM, December 2011, p. 6. ACKNOWLEDGMENT This work is supported by the SeaSTAR project funded by the Dutch Technology Foundation (STW) and the European Commission under the 7th Framework Programme (grant agreement no CLAM). REFERENCES [1] A. A. Syed and J. Heidemann, Time synchronization for high latency acoustic networks, in In Proc. IEEE InfoCom, [2] K. Y. Foo and P. R. Atkins, A relative-localization algorithm using incomplete pairwise distance measurements for underwater applications, EURASIP J. Adv. Signal Process, vol. 2010, pp. 11:1 11:7, January [Online]. Available: [3] W. A. P. van Kleunen, N. Meratnia, and P. J. M. Havinga, A set of simplified scheduling constraints for underwater acoustic mac scheduling, in The 3rd International Workshop on Underwater Networks (WUnderNet-2011), Singapore. Singapore: IEEE Computer Society, March 2011, pp

Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol

Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol Impact Analysis of Different Scheduling and Retransmission Techniques on an Underwater Routing Protocol Salvador Climent 1 Nirvana Meratnia 2 Juan Vicente Capella 1 1 Universitat Politècnica de València

More information

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks

Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Experimental Demonstration of Super-TDMA: A MAC Protocol Exploiting Large Propagation Delays in Underwater Acoustic Networks Prasad Anjangi and Mandar Chitre Department of Electrical & Computer Engineering,

More information

Distributed Scheduling and Routing in Underwater Wireless Networks

Distributed Scheduling and Routing in Underwater Wireless Networks Distributed Scheduling and Routing in Underwater Wireless Networks Kurtis Kredo II Electrical and Computer Engineering Dept. California State University, Chico kkredo@csuchico.edu Prasant Mohapatra Computer

More information

Time Synchronization in Wireless Sensor Networks: CCTS

Time Synchronization in Wireless Sensor Networks: CCTS Time Synchronization in Wireless Sensor Networks: CCTS 1 Nerin Thomas, 2 Smita C Thomas 1, 2 M.G University, Mount Zion College of Engineering, Pathanamthitta, India Abstract: A time synchronization algorithm

More information

MAC Essentials for Wireless Sensor Networks

MAC Essentials for Wireless Sensor Networks MAC Essentials for Wireless Sensor Networks Abdelmalik Bachir, Mischa Dohler, Senior Member, IEEE, Thomas Watteyne, Member, IEEE, and Kin K. Leung, Fellow, IEEE Medium access control Part of the link layer

More information

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks

Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Delay Analysis of ML-MAC Algorithm For Wireless Sensor Networks Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India ABSTRACT The present work is to evaluate

More information

Reservation Packet Medium Access Control for Wireless Sensor Networks

Reservation Packet Medium Access Control for Wireless Sensor Networks Reservation Packet Medium Access Control for Wireless Sensor Networks Hengguang Li and Paul D Mitchell Abstract - This paper introduces the Reservation Packet Medium Access Control (RP-MAC) protocol for

More information

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks

R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks R-MAC: An Energy-Efficient MAC Protocol for Underwater Sensor Networks Peng Xie and Jun-Hong Cui UCONN CSE Technical Report: UbiNet-TR06-06 Last Update: June 2007 Abstract Underwater sensor networks are

More information

Reliable and Energy Efficient Protocol for Wireless Sensor Network

Reliable and Energy Efficient Protocol for Wireless Sensor Network Reliable and Energy Efficient Protocol for Wireless Sensor Network Hafiyya.R.M 1, Fathima Anwar 2 P.G. Student, Department of Computer Engineering, M.E.A Engineering College, Perinthalmanna, Kerala, India

More information

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor

An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor IJCTA, 9(12), 2016, pp. 5727-5731 International Science Press 5727 An Optimized Time Synchronization Algorithm for Mobile Submarine Sensor Networ orks *L. Sivagami **J.Martin Leo Manickam, Member, IEEE

More information

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks

Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless Sensor Networks Distributed Sensor Networks Volume 2013, Article ID 858765, 6 pages http://dx.doi.org/10.1155/2013/858765 Research Article MFT-MAC: A Duty-Cycle MAC Protocol Using Multiframe Transmission for Wireless

More information

A Survey on Underwater Sensor Network Architecture and Protocols

A Survey on Underwater Sensor Network Architecture and Protocols A Survey on Underwater Sensor Network Architecture and Protocols Rakesh V S 4 th SEM M.Tech, Department of Computer Science MVJ College of Engineering Bangalore, India raki.rakesh102@gmail.com Srimathi

More information

CHAPTER 5 PROPAGATION DELAY

CHAPTER 5 PROPAGATION DELAY 98 CHAPTER 5 PROPAGATION DELAY Underwater wireless sensor networks deployed of sensor nodes with sensing, forwarding and processing abilities that operate in underwater. In this environment brought challenges,

More information

Reliable Time Synchronization Protocol for Wireless Sensor Networks

Reliable Time Synchronization Protocol for Wireless Sensor Networks Reliable Time Synchronization Protocol for Wireless Sensor Networks Soyoung Hwang and Yunju Baek Department of Computer Science and Engineering Pusan National University, Busan 69-735, South Korea {youngox,yunju}@pnu.edu

More information

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL FOR SUPPORTING QOS IN WIRELESS SENSOR NETWORKS YINGHUI QIU School of Electrical and Electronic Engineering, North China Electric Power University, Beijing, 102206, China ABSTRACT

More information

Mobile Agent Driven Time Synchronized Energy Efficient WSN

Mobile Agent Driven Time Synchronized Energy Efficient WSN Mobile Agent Driven Time Synchronized Energy Efficient WSN Sharanu 1, Padmapriya Patil 2 1 M.Tech, Department of Electronics and Communication Engineering, Poojya Doddappa Appa College of Engineering,

More information

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS

AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS AN EFFICIENT MAC PROTOCOL BASED ON HYBRID SUPERFRAME FOR WIRELESS SENSOR NETWORKS Ge Ma and Dongyu Qiu Department of Electrical and Computer Engineering Concordia University, Montreal, QC, Canada tina0702@gmail.com,

More information

Improving IEEE Power Saving Mechanism

Improving IEEE Power Saving Mechanism 1 Improving IEEE 82.11 Power Saving Mechanism Eun-Sun Jung 1 and Nitin H. Vaidya 2 1 Dept. of Computer Science, Texas A&M University, College Station, TX 77843, USA Email: esjung@cs.tamu.edu 2 Dept. of

More information

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions

MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions MID-TERM EXAM TCP/IP NETWORKING Duration: 2 hours With Solutions Jean-Yves Le Boudec 2005 December 8 Do not forget to put your names on all sheets of your solution. If you need to make assumptions in order

More information

IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network

IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network IRI-MAC: An Improved Receiver Initiated MAC Protocol for Wireless Sensor Network Md. Abir Hossain Department of Information and Communication Technology (ICT), Mawlana Bhashani Science and Technology University

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network

Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Geographical Routing Algorithms In Asynchronous Wireless Sensor Network Vaishali.S.K, N.G.Palan Electronics and telecommunication, Cummins College of engineering for women Karvenagar, Pune, India Abstract-

More information

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview

Abstract. 1. Introduction. 2. Theory DOSA Motivation and Overview Experiences with Implementing a Distributed and Self-Organizing Scheduling Algorithm for Energy-Efficient Data Gathering on a Real-Life Sensor Network Platform Yang Zhang, Supriyo Chatterjea, Paul Havinga

More information

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol

An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol An Energy Consumption Analytic Model for A Wireless Sensor MAC Protocol Hung-Wei Tseng, Shih-Hsien Yang, Po-Yu Chuang,Eric Hsiao-Kuang Wu, and Gen-Huey Chen Dept. of Computer Science and Information Engineering,

More information

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network

Improving the Data Scheduling Efficiency of the IEEE (d) Mesh Network Improving the Data Scheduling Efficiency of the IEEE 802.16(d) Mesh Network Shie-Yuan Wang Email: shieyuan@csie.nctu.edu.tw Chih-Che Lin Email: jclin@csie.nctu.edu.tw Ku-Han Fang Email: khfang@csie.nctu.edu.tw

More information

QoS-Enabled Video Streaming in Wireless Sensor Networks

QoS-Enabled Video Streaming in Wireless Sensor Networks QoS-Enabled Video Streaming in Wireless Sensor Networks S. Guo and T.D.C. Little Department of Electrical and Computer Engineering Boston University, Boston, MA 02215 {guosong, tdcl}@bu.edu MCL Technical

More information

Review on an Underwater Acoustic Networks

Review on an Underwater Acoustic Networks Review on an Underwater Acoustic Networks Amanpreet Singh Mann Lovely Professional University Phagwara, Punjab Reena Aggarwal Lovely Professional University Phagwara, Punjab Abstract: For the enhancement

More information

WSN Routing Protocols

WSN Routing Protocols WSN Routing Protocols 1 Routing Challenges and Design Issues in WSNs 2 Overview The design of routing protocols in WSNs is influenced by many challenging factors. These factors must be overcome before

More information

A Two-phase Distributed Training Algorithm for Linear SVM in WSN

A Two-phase Distributed Training Algorithm for Linear SVM in WSN Proceedings of the World Congress on Electrical Engineering and Computer Systems and Science (EECSS 015) Barcelona, Spain July 13-14, 015 Paper o. 30 A wo-phase Distributed raining Algorithm for Linear

More information

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization

Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Wireless Sensor Networks: Clustering, Routing, Localization, Time Synchronization Maurizio Bocca, M.Sc. Control Engineering Research Group Automation and Systems Technology Department maurizio.bocca@tkk.fi

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January ISSN

International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January ISSN International Journal of Scientific & Engineering Research, Volume 7, Issue 1, January-2016 1631 Innovative Routing and Time Synchronization in Underwater Sensor networks Vidya.R 1, Ambika.G.N 2, P Haripriya

More information

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007

Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Distributed consensus protocols for clock synchronization in sensor networks Luca Schenato Workshop on cooperative multi agent systems Pisa, 6/12/2007 Outline Motivations Intro to consensus algorithms

More information

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016

298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 15, NO. 1, JANUARY 2016 298 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 5, NO., JANUARY 206 Hybrid Network Coding for Unbalanced Slotted ALOHA Relay Networks Shijun Lin, Member, IEEE, Liqun Fu, Member, IEEE, Jianmin Xie,

More information

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks

Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Dynamic Minimal Spanning Tree Routing Protocol for Large Wireless Sensor Networks Guangyan Huang 1, Xiaowei Li 1, and Jing He 1 Advanced Test Technology Lab., Institute of Computing Technology, Chinese

More information

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS

SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS SURFACE-LEVEL GATEWAY DEPLOYMENT FOR UNDERWATER SENSOR NETWORKS Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut, Storrs,

More information

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018

CS 43: Computer Networks. 27: Media Access Contd. December 3, 2018 CS 43: Computer Networks 27: Media Access Contd. December 3, 2018 Last Class The link layer provides lots of functionality: addressing, framing, media access, error checking could be used independently

More information

Optimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization

Optimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization Optimization of Energy Consumption in Wireless Sensor Networks using Particle Swarm Optimization Madhusmita Nandi School of Electronics Engineering, KIIT University Bhubaneswar-751024, Odisha, India Jibendu

More information

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks

A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks A JSW-based Cooperative Transmission Scheme for Underwater Acoustic Networks Mingsheng Gao Computing Laboratory National University of Singapore mingsh.gao@gmail.com Hui Jiang Department of Computer Science

More information

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network

Performance and Comparison of Energy Efficient MAC Protocol in Wireless Sensor Network www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 3 March 2015, Page No. 10652-10656 Performance and Comparison of Energy Efficient MAC Protocol in Wireless

More information

Performance of DSMA/CD in CDPD Networks

Performance of DSMA/CD in CDPD Networks Performance of DSMA/CD in CDPD Networks Riikka Susitaival Networking Laboratory, Helsinki University of Technology Email: Riikka.Susitaival@hut.fi November 23, 2002 Abstract Cellular Digital Packet Data

More information

FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks

FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks FTA-MAC: Fast Traffic Adaptive energy efficient MAC protocol for Wireless Sensor Networks Van-Thiep Nguyen, Matthieu Gautier, and Olivier Berder University of Rennes 1, IRISA, France, {van-thiep.nguyen,matthieu.gautier,olivier.berder}@irisa.fr

More information

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks

An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks An Energy-Efficient MAC using Dynamic Phase Shift for Wireless Sensor Networks Yoh-han Lee Department of Electrical Engineering Korea Advanced Institute of Science & Technology Daejeon, KOREA yohhanlee@kaist.ac.kr

More information

Reminder: Datalink Functions Computer Networking. Datalink Architectures

Reminder: Datalink Functions Computer Networking. Datalink Architectures Reminder: Datalink Functions 15-441 15 441 15-641 Computer Networking Lecture 5 Media Access Control Peter Steenkiste Fall 2015 www.cs.cmu.edu/~prs/15-441-f15 Framing: encapsulating a network layer datagram

More information

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired

Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Power-efficient Communication Protocol for Social Networking Tags for Visually Impaired Problem Social Networking Tags System for Visually Impaired is an project aims to utilize electronic id technology

More information

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols 1th WEA International Conference on COMMUICATIO, Heraklion, reece, July 3-5, 8 Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

More information

Comparison of Two Synchronization Protocol in Wireless Sensor Network

Comparison of Two Synchronization Protocol in Wireless Sensor Network Comparison of Two Synchronization Protocol in Wireless Sensor Network S.Rucksana 1, C. Babu 2, S.Saranyabharathi 3 P.G. Scholar, Department of ECE, Knowledge Institute of Technology, Salem, Tamil Nadu,

More information

Choosing the Packet Size in Multi-hop Underwater Networks

Choosing the Packet Size in Multi-hop Underwater Networks Choosing the Packet Size in Multi-hop Underwater Networks Stefano Basagni, Chiara Petrioli, Roberto Petroccia and Milica Stojanovic ECE Department Northeastern University {basagni, millitsa}@ece.neu.edu

More information

IN distributed random multiple access, nodes transmit

IN distributed random multiple access, nodes transmit 414 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 52, NO. 2, FEBRUARY 2006 Power Levels and Packet Lengths in Random Multiple Access With Multiple-Packet Reception Capability Jie Luo, Member, IEEE, and

More information

Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks

Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks Tri-Message: A Lightweight Time Synchronization Protocol for High Latency and Resource-Constrained Networks Chen Tian 1 Hongbo Jiang 1 Xue Liu 2 Xinbing Wang 3 Wenyu Liu 1 Yi Wang 1 1 Department of EIE,

More information

Multichannel MAC for Energy Efficient Home Area Networks

Multichannel MAC for Energy Efficient Home Area Networks 1st International Workshop on GReen Optimized Wireless Networks (GROWN'13) Multichannel MAC for Energy Efficient Home Area Networks Kok Keong Chai, Shihab Jimaa, Yun Li, Yue Chen, and Siying Wang Abstract

More information

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks

A Review Paper On The Performance Analysis Of LMPC & MPC For Energy Efficient In Underwater Sensor Networks www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 4 Issue 5 May 2015, Page No. 12171-12175 A Review Paper On The Performance Analysis Of LMPC & MPC For Energy

More information

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks

A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks A Location-based Directional Route Discovery (LDRD) Protocol in Mobile Ad-hoc Networks Stephen S. Yau, Wei Gao, and Dazhi Huang Dept. of Computer Science and Engineering Arizona State University Tempe,

More information

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy

Lecture 12 December 04, Wireless Access. Graduate course in Communications Engineering. University of Rome La Sapienza. Rome, Italy Lecture 12 December 04, 2017 Wireless Access Graduate course in Communications Engineering University of Rome La Sapienza Rome, Italy 2017-2018 Random Medium Access Control Part II - CSMA and Collision

More information

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks

An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks An Enhanced Aloha based Medium Access Control Protocol for Underwater Sensor Networks Abdul Gaffar. H 1, a and P.Venkata Krishna 2,b 1 School of Computer Science and Engineering, VIT University, Vellore,

More information

Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing

Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing 2013 8th International Conference on Communications and Networking in China (CHINACOM) Reservation Multiple Access in Underwater Sensor Networks Based on Compressed Sensing Shuo Shi, Xue Wang and Xuemai

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

Delay-minimal Transmission for Energy Constrained Wireless Communications

Delay-minimal Transmission for Energy Constrained Wireless Communications Delay-minimal Transmission for Energy Constrained Wireless Communications Jing Yang Sennur Ulukus Department of Electrical and Computer Engineering University of Maryland, College Park, M0742 yangjing@umd.edu

More information

Some Optimization Trade-offs in Wireless Network Coding

Some Optimization Trade-offs in Wireless Network Coding Some Optimization Trade-offs in Wireless Network Coding Yalin Evren Sagduyu and Anthony Ephremides Electrical and Computer Engineering Department and Institute for Systems Research University of Maryland,

More information

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks

A MAC Protocol with Little Idle Listening for Wireless Sensor Networks A MAC Protocol with Little Idle Listening for Wireless Sensor Networks Chaoguang Men 1,, Yongqian Lu 1, Dongsheng Wang 1, 1 Research and Development Center of High Dependability Computing Technology, Harbin

More information

Experiment report. Figure 1: Deployment location

Experiment report. Figure 1: Deployment location Experiment report 1. Experiment time: July 30th, 2015 2. Experiment location: receiving Node (MID3) was placed at Pocock rowing center and two source nodes (MID1, MID2) were setup in APL location. Figure

More information

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks

An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Article An Efficient Scalable Scheduling MAC Protocol for Underwater Sensor Networks Faisal Alfouzan *, Alireza Shahrabi, Seyed Mohammad Ghoreyshi and Tuleen Boutaleb School of Engineering and Built Environment,

More information

Experimental Node Failure Analysis in WSNs

Experimental Node Failure Analysis in WSNs Experimental Node Failure Analysis in WSNs Jozef Kenyeres 1.2, Martin Kenyeres 2, Markus Rupp 1 1) Vienna University of Technology, Institute of Communications, Vienna, Austria 2) Slovak University of

More information

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017

CS 43: Computer Networks Media Access. Kevin Webb Swarthmore College November 30, 2017 CS 43: Computer Networks Media Access Kevin Webb Swarthmore College November 30, 2017 Multiple Access Links & Protocols Two classes of links : point-to-point dial-up access link between Ethernet switch,

More information

SENSOR-MAC CASE STUDY

SENSOR-MAC CASE STUDY SENSOR-MAC CASE STUDY Periodic Listen and Sleep Operations One of the S-MAC design objectives is to reduce energy consumption by avoiding idle listening. This is achieved by establishing low-duty-cycle

More information

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties

Outline. Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Outline Introduction to Networked Embedded Systems - Embedded systems Networked embedded systems Embedded Internet - Network properties Layered Network Architectures - OSI framework descriptions of layers

More information

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS

PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS PERFORMANCE ANALYSIS OF AODV ROUTING PROTOCOL IN MANETS AMANDEEP University College of Engineering, Punjabi University Patiala, Punjab, India amandeep8848@gmail.com GURMEET KAUR University College of Engineering,

More information

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary

CPSC 441 Tutorial-19. Department of Computer Science University of Calgary CPSC 441 Tutorial-19 Department of Computer Science University of Calgary Problem-1 Consider n nodes that use the slotted CSMA/ CD with binary exponential back-off to access a shared broadcast channel.

More information

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks

Enhanced Power Saving Scheme for IEEE DCF Based Wireless Networks Enhanced Power Saving Scheme for IEEE 802.11 DCF Based Wireless Networks Jong-Mu Choi, Young-Bae Ko, and Jai-Hoon Kim Graduate School of Information and Communication Ajou University, Republic of Korea

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks - Energy Management Outline Energy Management Issue in ad hoc networks WS 2010/2011 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle

Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle 24 IJCSNS International Journal of Computer Science and Network Security, VOL.12 No.12, December 212 Low Power and Low Latency MAC Protocol: Dynamic Control of Radio Duty Cycle Jeehoon Lee*, Jongsoo Jeong,

More information

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations

Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Two-Tier WBAN/WLAN Healthcare Networks; Priority Considerations Saeed Rashwand Department of Computer Science University of Manitoba Jelena Mišić Department of Computer Science Ryerson University Abstract

More information

Redes de Computadores. Medium Access Control

Redes de Computadores. Medium Access Control Redes de Computadores Medium Access Control Manuel P. Ricardo Faculdade de Engenharia da Universidade do Porto 1 » How to control the access of computers to a communication medium?» What is the ideal Medium

More information

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48

Computer Networks. Today. Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs VU MIF CS 1/48 2/48 Computer Networks VU MIF CS 1/48 Today Principles of datalink layer services Multiple access links Adresavimas, ARP LANs Wireless LANs 2/48 1 Link layer: introduction terminology: hosts and routers: nodes

More information

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL

CHAPTER 2 WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL WIRELESS SENSOR NETWORKS AND NEED OF TOPOLOGY CONTROL 2.1 Topology Control in Wireless Sensor Networks Network topology control is about management of network topology to support network-wide requirement.

More information

Efficient Surface Gateway Deployment. For Underwater Sensor Networks

Efficient Surface Gateway Deployment. For Underwater Sensor Networks 1 Efficient Surface Gateway Deployment For Underwater Sensor Networks Saleh Ibrahim, Jun-Hong Cui, Reda Ammar {saleh, jcui, reda}@engr.uconn.edu Computer Science & Engineering University of Connecticut,

More information

Energy Management Issue in Ad Hoc Networks

Energy Management Issue in Ad Hoc Networks Wireless Ad Hoc and Sensor Networks (Energy Management) Outline Energy Management Issue in ad hoc networks WS 2009/2010 Main Reasons for Energy Management in ad hoc networks Classification of Energy Management

More information

Synchronization in Sensor Networks

Synchronization in Sensor Networks Synchronization in Sensor Networks Blerta Bishaj Helsinki University of Technology 1. Introduction... 2 2. Characterizing Time Synchronization... 2 3. Causes of clock desynchronization... 3 4. Algorithms...

More information

Energy-Aware Routing in Wireless Ad-hoc Networks

Energy-Aware Routing in Wireless Ad-hoc Networks Energy-Aware Routing in Wireless Ad-hoc Networks Panagiotis C. Kokkinos Christos A. Papageorgiou Emmanouel A. Varvarigos Abstract In this work we study energy efficient routing strategies for wireless

More information

ECE 4450:427/527 - Computer Networks Spring 2017

ECE 4450:427/527 - Computer Networks Spring 2017 ECE 4450:427/527 - Computer Networks Spring 2017 Dr. Nghi Tran Department of Electrical & Computer Engineering Lecture 5.4: Multiple Access Protocols Dr. Nghi Tran (ECE-University of Akron) ECE 4450:427/527

More information

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS

AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS International Journal on Intelligent Electronic Systems, Vol.3, No.2, July 2009 7 Abstract AN ADAPTIVE ENERGY EFFICIENT MAC PROTOCOL FOR WIRELESS SENSOR NETWORKS Lakshmanan M., Noor Mohammed V. 1 E-mail

More information

Sabareesan M, Srinivasan S*,John Deva Prasanna D S

Sabareesan M, Srinivasan S*,John Deva Prasanna D S Overall performance of Flooding Sequence Protocol in Wireless Sensor Networks Sabareesan M, Srinivasan S*,John Deva Prasanna D S Department of Computer Science and Technology, Hindustan University, Chennai,

More information

CSCI 466 Midterm Networks Fall 2011

CSCI 466 Midterm Networks Fall 2011 CSCI 466 Midterm Networks Fall 2011 Name: This exam consists of 7 problems on the following 9 pages. You may use your single- sided hand- written 8 ½ x 11 note sheet and a calculator during the exam. No

More information

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks

A Hybrid Medium Access Control Protocol for Underwater Wireless Networks A Medium Access Control Protocol for Underwater Wireless Networks Kurtis B. Kredo II Electrical and Computer Engineering Dept. University of California, Davis kbkredo@ucdavis.edu Prasant Mohapatra Computer

More information

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications

Distributed Interference-aware Medium Access Control for IEEE Visible Light Communications Sensors and Materials, Vol. 30, No. 8 (2018) 1665 1670 MYU Tokyo 1665 S & M 1623 Distributed Interference-aware Medium Access Control for IEEE 802.15.7 Visible Light Communications Eui-Jik Kim, 1 Jung-Hyok

More information

Improving Channel Scanning Procedures for WLAN Handoffs 1

Improving Channel Scanning Procedures for WLAN Handoffs 1 Improving Channel Scanning Procedures for WLAN Handoffs 1 Shiao-Li Tsao and Ya-Lien Cheng Department of Computer Science, National Chiao Tung University sltsao@cs.nctu.edu.tw Abstract. WLAN has been widely

More information

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS

CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS 28 CHAPTER 3 EFFECTIVE ADMISSION CONTROL MECHANISM IN WIRELESS MESH NETWORKS Introduction Measurement-based scheme, that constantly monitors the network, will incorporate the current network state in the

More information

Event-based sampling for wireless network control systems with QoS

Event-based sampling for wireless network control systems with QoS 21 American Control Conference Marriott Waterfront, Baltimore, MD, USA June 3-July 2, 21 WeC8.3 Event-based sampling for wireless network control systems with QoS Adrian D. McKernan and George W. Irwin

More information

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks

Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Low Overhead Geometric On-demand Routing Protocol for Mobile Ad Hoc Networks Chang Su, Lili Zheng, Xiaohai Si, Fengjun Shang Institute of Computer Science & Technology Chongqing University of Posts and

More information

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks

Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Connectivity, Energy and Mobility Driven Clustering Algorithm for Mobile Ad Hoc Networks Fatiha Djemili Tolba University of Haute Alsace GRTC Colmar, France fatiha.tolba@uha.fr Damien Magoni University

More information

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29,

Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, Proceedings of the 6th WSEAS International Conference on Applications of Electrical Engineering, Istanbul, Turkey, May 27-29, 2007 211 Design and Implementation of Low Power Network Maintenance Protocols

More information

Impact of IEEE n Operation on IEEE Operation

Impact of IEEE n Operation on IEEE Operation 2009 International Conference on Advanced Information Networking and Applications Workshops Impact of IEEE 802.11n Operation on IEEE 802.15.4 Operation B Polepalli, W Xie, D Thangaraja, M Goyal, H Hosseini

More information

A Low-Energy Adaptive and Distributed MAC Protocol for Wireless Sensor-Actuator Networks

A Low-Energy Adaptive and Distributed MAC Protocol for Wireless Sensor-Actuator Networks Institut Eurécom Department of Mobile Communications 2229, route des Crêtes B.P. 193 06904 Sophia-Antipolis FRANCE Research Report RR-06-161 A Low-Energy Adaptive and Distributed MAC Protocol for Wireless

More information

Optimization on TEEN routing protocol in cognitive wireless sensor network

Optimization on TEEN routing protocol in cognitive wireless sensor network Ge et al. EURASIP Journal on Wireless Communications and Networking (2018) 2018:27 DOI 10.1186/s13638-018-1039-z RESEARCH Optimization on TEEN routing protocol in cognitive wireless sensor network Yanhong

More information

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30

1-1. Switching Networks (Fall 2010) EE 586 Communication and. November 8, Lecture 30 EE 586 Communication and Switching Networks (Fall 2010) Lecture 30 November 8, 2010 1-1 Announcements Quiz on Wednesday Next Monday hands-on training on Contiki OS Bring your laptop 4-2 Multiple Access

More information

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks

PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks PATM: Priority-based Adaptive Topology Management for Efficient Routing in Ad Hoc Networks Haixia Tan, Weilin Zeng and Lichun Bao Donald Bren School of Information and Computer Sciences University of California,

More information

Chapter 6 Time synchronization

Chapter 6 Time synchronization Chapter 6 Time synchronization Outline 6.1. The Problems of Time Synchronization 6.2. Protocols Based on Sender/Receiver Synchronization Network Time Protocol (NTP) Timing-sync Protocol for Sensor Networks

More information

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider

standards like IEEE [37], IEEE [38] or IEEE [39] do not consider Chapter 5 IEEE 802.15.4 5.1 Introduction Wireless Sensor Network(WSN) is resource constrained network developed specially targeting applications having unattended network for long time. Such a network

More information

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK

COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD HOC NETWORK International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 531-538 COMPARATIVE STUDY AND ANALYSIS OF AODTPRR WITH DSR, DSDV AND AODV FOR MOBILE AD

More information

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching

Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching Randomized User-Centric Clustering for Cloud Radio Access Network with PHY Caching An Liu, Vincent LAU and Wei Han the Hong Kong University of Science and Technology Background 2 Cloud Radio Access Networks

More information

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks

An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks An AIAD-Based Adaptive Routing Protocol in Ad-Hoc Wireless Networks Youn-Sik Hong 1 and Ki-Young Lee 2 1 Department of Computer Science and Eng. 2 Department of Information and Telecommunication Eng.,

More information